selinux-ossec/ossec.if

225 lines
5.6 KiB
Text
Raw Permalink Normal View History

## <summary>ossec policy</summary>
## <desc>
## <p>
## More descriptive text about ossec. The desc
## tag can also use p, ul, and ol
## html tags for formatting.
## </p>
## <p>
## This policy supports the following ossec features:
## <ul>
## <li>Feature A</li>
## <li>Feature B</li>
## <li>Feature C</li>
## </ul>
## </p>
## </desc>
#
########################################
## <summary>
## Execute a domain transition to run ossec.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed to transition.
## </summary>
## </param>
#
interface(`ossec_domtrans',`
gen_require(`
type ossec_t, ossec_exec_t;
type httpd_t, httpd_exec_t;
role system_r;
')
domain_type(ossec_t)
domain_entry_file(ossec_t, ossec_exec_t)
role system_r types ossec_t;
domtrans_pattern($1, ossec_exec_t, ossec_t)
#domtrans_pattern($1,ossec_exec_t,ossec_t)
')
########################################
## <summary>
## Read ossec log files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed to read the log files.
## </summary>
## </param>
#
2015-11-25 10:49:08 -05:00
interface(`ossec_read_logs',`
gen_require(`
2015-11-25 10:49:08 -05:00
type var_t;
type ossec_log_t;
')
2015-11-25 10:49:08 -05:00
allow $1 var_t:dir search_dir_perms;
#read_files_pattern($1, ossec_log_t, ossec_log_t)
read_files_pattern($1, ossec_log_t, logfile)
#allow $1 ossec_log_t:dir search_dir_perms
#logging_search_logs($1)
#allow $1 ossec_log_t:file read_file_perms;
')
########################################
## <summary>
## Write ossec log files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed to write the log files.
## </summary>
## </param>
#
2015-11-25 10:49:08 -05:00
#interface(`ossec_write_log',`
# gen_require(`
# type ossec_log_t;
# ')
#
# allow $1 ossec_log_t:file write;
#')
interface(`ossec_read_config',`
gen_require(`
2015-11-25 10:49:08 -05:00
type var_t;
type ossec_etc_t;
')
2015-11-25 10:49:08 -05:00
allow $1 var_t:dir search_dir_perms;
#allow $1 ossec_etc_t:dir search_dir_perms;
read_lnk_files_pattern($1, ossec_etc_t, configfile)
files_read_config_files($1, ossec_etc_t)
')
2015-11-25 10:49:08 -05:00
#interface(`ossec_read_shared_config',`
# gen_require(`
# type var_t;
# type ossec_etc_t;
# #type ossec_etc_share_t;
# ')
#
# allow $1 var_t:dir search_dir_perms;
# allow $1 ossec_etc_t:dir search_dir_perms;
# #allow $1 ossec_etc_share_t:dir search_dir_perms;
# allow $1 ossec_etc_share_t:file read_file_perms;
# #allow $1 ossec_analysisd_file_t:file read_file_perms;
# #search_dirs_pattern($1, ossec_etc_t, ossec_etc_t)
# #search_dirs_pattern($1, ossec_etc_share_t, ossec_etc_share_t)
# #read_files_pattern($1, ossec_etc_share_t, ossec_etc_share_t)
#')
#interface(`ossec_manage_shared_config',`
# gen_require(`
# type ossec_etc_t;
# type ossec_etc_share_t;
# ')
#
# search_dirs_pattern($1, ossec_etc_t, ossec_etc_t)
# search_dirs_pattern($1, ossec_etc_share_t, ossec_etc_share_t)
# manage_files_pattern($1, ossec_etc_share_t, ossec_etc_share_t)
#')
2015-11-24 01:27:25 -05:00
interface(`ossec_pid_filetrans',`
gen_require(`
2015-11-25 10:49:08 -05:00
type var_t;
2015-11-24 01:27:25 -05:00
type ossec_var_t, ossec_var_run_t;
')
2015-11-25 10:49:08 -05:00
allow $1 var_t:dir search_dir_perms;
2015-11-24 01:27:25 -05:00
allow $1 ossec_var_t:dir search_dir_perms;
allow $1 ossec_var_run_t:lnk_file read_lnk_file_perms;
filetrans_pattern($1, ossec_var_run_t, $2, $3, $4)
')
interface(`ossec_log_filetrans',`
gen_require(`
2015-11-25 10:49:08 -05:00
type var_t;
type ossec_var_t, ossec_log_t;
2015-11-24 01:27:25 -05:00
')
2015-11-25 10:49:08 -05:00
allow $1 var_t:dir search_dir_perms;
allow $1 ossec_log_t:dir search_dir_perms;
2015-11-24 01:27:25 -05:00
filetrans_pattern($1, ossec_log_t, $2, $3, $4)
')
2015-11-25 10:49:08 -05:00
interface(`ossec_read_stats',`
gen_require(`
type var_t;
type ossec_stats_t;
')
allow $1 var_t:dir search_dir_perms;
read_files_pattern($1, ossec_stats_t, ossec_stats_t)
')
interface(`ossec_manage_stats',`
gen_require(`
type var_t;
type ossec_stats_t;
')
allow $1 var_t:dir search_dir_perms;
append_files_pattern($1, ossec_stats_t, ossec_stats_t)
')
interface(`ossec_read_queue',`
gen_require(`
type var_t;
type ossec_queue_t;
')
allow $1 var_t:dir search_dir_perms;
allow $1 ossec_queue_t:dir list_dir_perms;
allow $1 ossec_queue_t:file read_file_perms;
allow $1 ossec_remoted_file_t:dir list_dir_perms;
allow $1 ossec_remoted_file_t:file read_file_perms;
allow $1 ossec_analysisd_file_t:dir list_dir_perms;
allow $1 ossec_analysisd_file_t:file read_file_perms;
2015-11-25 10:49:08 -05:00
#read_files_pattern($1, ossec_queue_t, ossec_queue_t)
')
########################################
## <summary>
## Create objects in the spool directory
## with a private type with a type transition.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <param name="file">
## <summary>
## Type to which the created node will be transitioned.
## </summary>
## </param>
## <param name="class">
## <summary>
## Object class(es) (single or set including {}) for which this
## the transition will occur.
## </summary>
## </param>
## <param name="name" optional="true">
## <summary>
## The name of the object being created.
## </summary>
## </param>
#
interface(`ossec_queue_filetrans',`
gen_require(`
type var_t;
type ossec_queue_t;
')
allow $1 var_t:dir search_dir_perms;
allow $1 ossec_queue_t:dir search_dir_perms;
filetrans_pattern($1, ossec_queue_t, $2, $3, $4)
')